Sciweavers

669 search results - page 20 / 134
» Managing the Risk of IT Outsourcing
Sort
View
SSD
2009
Springer
193views Database» more  SSD 2009»
14 years 1 months ago
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
Outsourcing data to third party data providers is becoming a common practice for data owners to avoid the cost of managing and maintaining databases. Meanwhile, due to the populari...
Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang
HICSS
2008
IEEE
153views Biometrics» more  HICSS 2008»
14 years 1 months ago
Prioritizing Clinical Information System Project Risk Factors: A Delphi Study
Identifying the risks associated with the implementation of clinical information systems (CIS) in health care organizations can be a major challenge for managers, clinicians, and ...
Guy Paré, Claude Sicotte, Mirou Jaana, Davi...
COMPSAC
2007
IEEE
14 years 1 months ago
A History-Based Automatic Scheduling Model for Personnel Risk Management
Personnel risk is an issue which has not been researched well but plays an important role to determine whether a software project succeeds or fails. Most existing work focuses on ...
Hsinyi Jiang, Carl K. Chang, Jinchun Xia, Shuxing ...
FC
2001
Springer
91views Cryptology» more  FC 2001»
13 years 12 months ago
On the Global Content PMI: Improved Copy-Protected Internet Content Distribution
This article addresses a problem with copy-protecting a large collection of electronic content. The notion and severity of a generic attack are raised in the context of Adams and Z...
Tadayoshi Kohno, Mark McGovern
INFOCOM
2008
IEEE
14 years 1 months ago
A New Perspective on Internet Security using Insurance
—Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion dete...
Jean-Chrysostome Bolot, Marc Lelarge